CVE-2006-3819
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/07/2006
Last modified:
20/07/2017
Description
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:twiki:twiki:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:twiki:twiki:4.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:twiki:twiki:4.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:twiki:twiki:4.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:twiki:twiki:4.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:twiki:twiki:4.0.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/21235
- http://securitytracker.com/id?1016603=
- http://twiki.org/cgi-bin/view/Codev/SecurityAlertCmdExecWithConfigure
- http://www.osvdb.org/displayvuln.php?osvdb_id=27556
- http://www.securityfocus.com/bid/19188
- http://www.vupen.com/english/advisories/2006/2995
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28049